University of Kansas

Displaying 1-22 of 22 results

As technology improves, attackers are trying to get access to the network system resources by so many means. Open loop holes in the network allow them to penetrate in the network more easily; statistical methods have great importance in the area of computer and network security, in detecting the malfunctioning...

Management of fuzzy and vague information has been a research problem for computer scientists, particularly in artificial intelligence, relational and temporal databases. Fuzzy set theory has been widely used to cater this problem. Rough set theory is a newer approach to deal with uncertainty. After many years of rivalry between...

Great plains Environment for Network Innovation (GpENI) is an international testbed for future Internet research. A key component of GpENI is programmable network virtualization (GpENI-VINI). The scope of this paper is to present the framework, implementation and integration experience with network virtualization in GpENI. In particular, this is described through...

The strategic timing and adverse events hypotheses of personal bankruptcy have received particular attention. Existing research focuses on proving or disproving either hypothesis, using a strict interpretation of the role of financial benefit in the filing decision. Using a more realistic framework in which financial benefit may affect the filing...

Dynamic or Just-In-Time (JIT) compilation is crucial to achieve acceptable performance for applications written in traditionally interpreted languages, such as Java and C#. Such languages enable the generation of portable applications that are written and compiled once, and can be executed by a virtual machine on any supported architecture. However,...

Existing studies assume that the impact of democracy on FDI is the same for re-source exporting and non-resource exporting countries. This paper examines whether natural resources alter the relationship between FDI and democracy. The authors estimate a linear dynamic panel-data model using data from 112 developing countries over the period...

Research shows that minority children enter the labor market with lower levels of acquired skill than their white counterparts. The causes of this skill gap, however, are not entirely understood. This paper analyzes one possible cause: the impact of a perceived lack of future opportunities on the human capital investment...

This paper explores the disconnect of Federal Reserve data from index number theory. A consequence could have been the decreased systemic-risk misperceptions that contributed to excess risk taking prior to the housing bust. The authors find that most recessions in the past 50 years were preceded by more contractionary monetary...

The University of Kansas (KU), like any large and decentralized organization, found that information was not always available in a timely manner to make effective decisions. To help solve this dilemma, KU's Office of Institutional Research and Planning (OIRP) developed a planning and management information system using the SAS BI...

Increasingly, data and metadata are archived together in XML files. This paper works through the process of reading an XML file containing a data table, variable labels, notes about variables, and multiple sets of labels for values - some of which are not associated with any variable. First, the author...

Service Oriented Architectures can be quite complex which makes managing and monitoring them hard. Message exchanges as well as complete message flows are important when it comes to analyzing the performance of systems and identifying problems. The use of SOAP as the common message format for web services enables interoperability...

Application profiling is a popular technique to improve program performance based on its behavior. Offline profiling, although beneficial for several applications, fails in cases where prior program runs may not be feasible, or if changes in input cause the profile to not match the behavior of the actual program run....

The issues of compiler optimization phase ordering and selection present important challenges to compiler developers in several domains, and in particular to the speed, code size, power, and cost-constrained domain of embedded systems. Different sequences of optimization phases have been observed to provide the best performance for different applications. Compiler...

While on the surface the combination of software components that adhere to associated standards should lead to rapid and successful system implementation. However, issues can arise when integrating independently defined software subsystems. Here conflicts are discussed that arose when integrating elements from the Web Services Architecture (WSA) led by the...

This paper estimates empirical models for the forward-looking New Keynesian Phillips Curve (NKPC) when inflation is allowed to have a stochastic trend. Using the observed CBO output gap as a measure of economic activity, the author proposes a baseline Unobserved Components (UC) model as implied by the closed-form specification of...

This empirical study analyzes the effect of corporate environmental performance on financial performance in a transition economy. In particular, it assesses whether good environmental performance affects profits, and if so, in which direction. Then the study decomposes profits into revenues and costs in order to identify the channel(s) of any...

Information security is relatively new field that is experiencing rapid growth in terms of malicious attack frequency and the amount of capital that firms must spend on attack defense. This rise in security expenditures has prompted corporate leadership teams to scrutinize corporate security budgets. Information security risk, and the related...

High dimensional data challenges current feature selection methods. For many real world problems the authors often have prior knowledge about the relationship of features. For example in microarray data analysis, genes from the same biological pathways are expected to have similar relationship to the outcome that they target to predict....

Cargo shipments are subject to hijack, theft, or tampering. Furthermore, cargo shipments are at risk of being used to transport contraband, potentially resulting in fines to shippers. The Transportation Security Sensor Network (TSSN), which is based on open software systems and Service Oriented Architecture (SOA) principles, has been developed to...

If public speaking is to be taught, as noted in the call for this colloquy, "In a manner that reflects rhetoric's origin as a liberal art," we should be using course materials that best reflect that origin, namely, primary works from the classical tradition. Such texts offer a powerful articulation...

Telemetry applications in the mobile airborne networks pose unique challenges. In the current underlying network infrastructure these applications rely on point-to-point links based on IRIG 106 standard for Serial Streaming Telemetry (SST). Source and destination nodes should be in range of each other using the point-to-point links. In a scenario...

This paper contributes to the author's understanding of public service motivation by investigating ways in which organizational leaders can reinforce and even augment the potential effects of public service motivation on the employees' attraction to the organization's mission (mission valence). This research informs two research questions. First, it examines the...

If public speaking is to be taught, as noted in the call for this colloquy, "In a manner that reflects rhetoric's origin as a liberal art," we should be using course materials that best reflect that origin, namely, primary works from the classical tradition. Such texts offer a powerful articulation...

Information security is relatively new field that is experiencing rapid growth in terms of malicious attack frequency and the amount of capital that firms must spend on attack defense. This rise in security expenditures has prompted corporate leadership teams to scrutinize corporate security budgets. Information security risk, and the related...

This paper contributes to the author's understanding of public service motivation by investigating ways in which organizational leaders can reinforce and even augment the potential effects of public service motivation on the employees' attraction to the organization's mission (mission valence). This research informs two research questions. First, it examines the...

Service Oriented Architectures can be quite complex which makes managing and monitoring them hard. Message exchanges as well as complete message flows are important when it comes to analyzing the performance of systems and identifying problems. The use of SOAP as the common message format for web services enables interoperability...

This empirical study analyzes the effect of corporate environmental performance on financial performance in a transition economy. In particular, it assesses whether good environmental performance affects profits, and if so, in which direction. Then the study decomposes profits into revenues and costs in order to identify the channel(s) of any...

Research shows that minority children enter the labor market with lower levels of acquired skill than their white counterparts. The causes of this skill gap, however, are not entirely understood. This paper analyzes one possible cause: the impact of a perceived lack of future opportunities on the human capital investment...

Existing studies assume that the impact of democracy on FDI is the same for re-source exporting and non-resource exporting countries. This paper examines whether natural resources alter the relationship between FDI and democracy. The authors estimate a linear dynamic panel-data model using data from 112 developing countries over the period...

The strategic timing and adverse events hypotheses of personal bankruptcy have received particular attention. Existing research focuses on proving or disproving either hypothesis, using a strict interpretation of the role of financial benefit in the filing decision. Using a more realistic framework in which financial benefit may affect the filing...

This paper explores the disconnect of Federal Reserve data from index number theory. A consequence could have been the decreased systemic-risk misperceptions that contributed to excess risk taking prior to the housing bust. The authors find that most recessions in the past 50 years were preceded by more contractionary monetary...

While on the surface the combination of software components that adhere to associated standards should lead to rapid and successful system implementation. However, issues can arise when integrating independently defined software subsystems. Here conflicts are discussed that arose when integrating elements from the Web Services Architecture (WSA) led by the...

Dynamic or Just-In-Time (JIT) compilation is crucial to achieve acceptable performance for applications written in traditionally interpreted languages, such as Java and C#. Such languages enable the generation of portable applications that are written and compiled once, and can be executed by a virtual machine on any supported architecture. However,...

The issues of compiler optimization phase ordering and selection present important challenges to compiler developers in several domains, and in particular to the speed, code size, power, and cost-constrained domain of embedded systems. Different sequences of optimization phases have been observed to provide the best performance for different applications. Compiler...

Application profiling is a popular technique to improve program performance based on its behavior. Offline profiling, although beneficial for several applications, fails in cases where prior program runs may not be feasible, or if changes in input cause the profile to not match the behavior of the actual program run....

This paper estimates empirical models for the forward-looking New Keynesian Phillips Curve (NKPC) when inflation is allowed to have a stochastic trend. Using the observed CBO output gap as a measure of economic activity, the author proposes a baseline Unobserved Components (UC) model as implied by the closed-form specification of...

Telemetry applications in the mobile airborne networks pose unique challenges. In the current underlying network infrastructure these applications rely on point-to-point links based on IRIG 106 standard for Serial Streaming Telemetry (SST). Source and destination nodes should be in range of each other using the point-to-point links. In a scenario...

The University of Kansas (KU), like any large and decentralized organization, found that information was not always available in a timely manner to make effective decisions. To help solve this dilemma, KU's Office of Institutional Research and Planning (OIRP) developed a planning and management information system using the SAS BI...

Increasingly, data and metadata are archived together in XML files. This paper works through the process of reading an XML file containing a data table, variable labels, notes about variables, and multiple sets of labels for values - some of which are not associated with any variable. First, the author...

As technology improves, attackers are trying to get access to the network system resources by so many means. Open loop holes in the network allow them to penetrate in the network more easily; statistical methods have great importance in the area of computer and network security, in detecting the malfunctioning...

High dimensional data challenges current feature selection methods. For many real world problems the authors often have prior knowledge about the relationship of features. For example in microarray data analysis, genes from the same biological pathways are expected to have similar relationship to the outcome that they target to predict....

Cargo shipments are subject to hijack, theft, or tampering. Furthermore, cargo shipments are at risk of being used to transport contraband, potentially resulting in fines to shippers. The Transportation Security Sensor Network (TSSN), which is based on open software systems and Service Oriented Architecture (SOA) principles, has been developed to...

Great plains Environment for Network Innovation (GpENI) is an international testbed for future Internet research. A key component of GpENI is programmable network virtualization (GpENI-VINI). The scope of this paper is to present the framework, implementation and integration experience with network virtualization in GpENI. In particular, this is described through...

Management of fuzzy and vague information has been a research problem for computer scientists, particularly in artificial intelligence, relational and temporal databases. Fuzzy set theory has been widely used to cater this problem. Rough set theory is a newer approach to deal with uncertainty. After many years of rivalry between...

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?